Bluesnarfing

Post Reply
User avatar
Royal
Posts: 10566
Joined: Mon Apr 11, 2011 5:55 pm

Bluesnarfing

Post by Royal » Sat Oct 06, 2018 6:39 pm

Bluesnarfing in Action

To set up a bluesnarf attack, a hacker needs to exploit the vulnerabilities present in some deployments of the object exchange (OBEX) protocol, widely used to execute the exchange of information between wireless devices. The attacker only needs to connect to a service which doesn’t require authentication and request the required information.

Once the OBEX protocol is compromised, a hacker can synchronize their own system with their targeted victim’s device in a process known as pairing. If the firmware on a device is unsecured, an attacker may be able to gain access to and steal all information. They may also be able to gain access to any services available to the targeted user.

Knowing what type of devices exist in a wireless radio-wave environment is the first line of defense. That said, the Inpixon IPA Security solution features sensors equipped with Bluetooth-device detection and positioning. Within a facility, and on a given floorplan, IPA Sensors pinpoint and position potential high-risk Bluetooth devices used for bluesnarfing. Once identified and located, users can take further action by physically disabling a risky device.

Other ways to avoid bluesnarfing include deactivating discovery mode, keeping your mobile device in invisible mode, and using available anti-bluesnarfing tools which restrict device connection to only those which are already known.

https://inpixon.com/2018/04/18/bluesnarfing/


Post Reply